CVE Vulnerabilities

CVE-2018-14553

NULL Pointer Dereference

Published: Feb 11, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.4 LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

gdImageClone in gd.c in libgd 2.1.0-rc2 through 2.2.5 has a NULL pointer dereference allowing attackers to crash an application via a specific function call sequence. Only affects PHP when linked with an external libgd (not bundled).

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
LibgdLibgd2.1.1 (including)2.2.5 (including)
LibgdLibgd2.1.0 (including)2.1.0 (including)
LibgdLibgd2.1.0-rc2 (including)2.1.0-rc2 (including)
Red Hat Enterprise Linux 8RedHatgd-0:2.2.5-7.el8*
DoxygenUbuntudevel*
DoxygenUbuntuesm-apps/focal*
DoxygenUbuntuesm-apps/jammy*
DoxygenUbuntuesm-apps/noble*
DoxygenUbuntufocal*
DoxygenUbuntugroovy*
DoxygenUbuntuhirsute*
DoxygenUbuntuimpish*
DoxygenUbuntujammy*
DoxygenUbuntukinetic*
DoxygenUbuntulunar*
DoxygenUbuntumantic*
DoxygenUbuntunoble*
DoxygenUbuntuoracular*
DoxygenUbuntuplucky*
DoxygenUbuntuquesting*
DoxygenUbuntutrusty*
Libgd2Ubuntubionic*
Libgd2Ubuntudevel*
Libgd2Ubuntueoan*
Libgd2Ubuntuesm-infra-legacy/trusty*
Libgd2Ubuntuesm-infra/bionic*
Libgd2Ubuntuesm-infra/focal*
Libgd2Ubuntuesm-infra/xenial*
Libgd2Ubuntufocal*
Libgd2Ubuntugroovy*
Libgd2Ubuntuhirsute*
Libgd2Ubuntuimpish*
Libgd2Ubuntujammy*
Libgd2Ubuntukinetic*
Libgd2Ubuntulunar*
Libgd2Ubuntumantic*
Libgd2Ubuntunoble*
Libgd2Ubuntuoracular*
Libgd2Ubuntuplucky*
Libgd2Ubuntuquesting*
Libgd2Ubuntutrusty*
Libgd2Ubuntutrusty/esm*
Libgd2Ubuntuxenial*

Potential Mitigations

References